Orin S. Kerr, Are We Overprotecting Code? Thoughts on First-Generation Internet Law, 57 Wash. & Lee L. Rev. 1287, 1300 (2000)

Select an item to find more about the requirement.
Authorization
Ongoing Investigation
Reasonable Grounds
Trespasser Defined

[links written for final product pages -- will not work in storyboards]
To correct this problem, the amendments in Section 217 of the Act allow victims of computer attacks to authorize persons "acting under color of law" to monitor trespassers on their computer systems. Under new section 2511\(2\)\(i\), law enforcement agencies may intercept the communications of a computer trespasser transmitted to, through, or from a protected computer. Before monitoring can occur, however, four requirements must be met. These provisions will sunset December 31, 2005. Select a requirement to learn more.

<img src="../../images/cy206180_lbd.gif" width="780" height="456" border="0">
Glossary
Resources
Show Text
Site Map
Help
Exit
Back
13 of 42
Next